Crea il mio profilo
Accesso pubblico
Visualizza tutto8 articoli
3 articoli
Disponibili
Non disponibili
In base ai mandati di finanziamento
Coautori
- peter graboskyEmail verificata su anu.edu.au
- anna ferranteCurtin University & University of Western AustraliaEmail verificata su curtin.edu.au
- Harshit TrivediLaboratory Coordinator, ANU Cybercrime ObservatoryEmail verificata su anu.edu.au
- Kathleen DalyGriffith University (Brisbane, Australia)Email verificata su griffith.edu.au
- Julie AylingEuropean University InstituteEmail verificata su eui.eu
- Yuguang IpsenAustralian National UniversityEmail verificata su anu.edu.au
- Lennon Y.C. Chang 張耀中Associate Professor, Cyber Risk and Policy, Deakin UniversityEmail verificata su deakin.edu.au
- Mark LauchsAssoc Prof at Queensland University of TechnologyEmail verificata su qut.edu.au
- Jason PayneUniversity of WollongongEmail verificata su uow.edu.au
- Rick BrownAustralian Institute of CriminologyEmail verificata su aic.gov.au
- Psl BehAssociate Professor, Department of Pathology, The University of Hong KongEmail verificata su pathology.hku.hk
- Peng WangAssociate Professor, The University of Hong KongEmail verificata su hku.hk
- Khoi-Nguyen TranResearch Software Engineer, IBM Research - AlmadenEmail verificata su ibm.com
- T. Wing LoSaint Francis University, Hong KongEmail verificata su sfu.edu.hk
Segui
Roderic Broadhurst
Emeritus Professor, Regnet, Research School of Asia and the Pacific, Australian National University
Email verificata su anu.edu.au - Home page